13.07.2015 Views

UL Addendum - Tyco Security Products

UL Addendum - Tyco Security Products

UL Addendum - Tyco Security Products

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>UL</strong> LISTED ENCRYPTED LINE SECURITY CONFIGURATIONConceptual View of NetworkA conceptual view of the <strong>UL</strong> Listed Encrypted Line <strong>Security</strong> Configuration is shown in thefollowing diagram "Conceptual View of Campus Network."The head end LAN is isolated from the campus network by a firewall and an encrypting router(Software House Model: 0101-0180-01). Communication from the C•CURE 800 server to theiSTAR Pro panel is through an encrypted VPN tunnel between the two encrypting routers(Software House Model: 0101-0180-01 and Software House Model: 0101-0181-01).The Software House Model 0101-0180-01 and 0101-0181-01 routers have been validated ascorrectly implementing the Advanced Encryption Standard (AES) algorithm, specified in theFederal Information Processing Standard Publication 197 (FIPS 197), Advanced EncryptionStandard.Testing was performed by NVLAP accredited Cryptographic Module Testing (CMT)laboratories using the tests found in The Advanced Encryption Standard Algorithm ValidationSuite (AESAVS).The National Institute of Standards and Technology (NIST) has made every attempt to providecomplete and accurate information about the testing implementations; however, it is theresponsibility of the vendor to notify NIST of any necessary changes to its entry.Conceptual View of Campus NetworkC·CURE 800/8000 V9.4 <strong>UL</strong> <strong>Addendum</strong>37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!